logoalt Hacker News

tobyhinloopenyesterday at 10:43 PM0 repliesview on HN

A great start is to have LLMs use special UNIX users that can’t do anything except that you allowed them to do, including accessing the database with a read only user.